XZ backdoor in a nutshell

https://lemmy.zip/post/12859629

XZ backdoor in a nutshell - Lemmy.zip

I have heard multiple times from different sources that building from git source instead of using tarballs invalidates this exploit, but I do not understand how. Is anyone able to explain that?

If malicious code is in the source, and therefore in the tarball, what’s the difference?

Because m4/build-to-host.m4, the entry point, is not in the git repo, but was included by the malicious maintainer into the tarballs.
Tarballs are not built from source?

The tarballs are the official distributions of the source code. The maintainer made the source code ignore the malicious entry point while retaining it inside these distributions.

All of this would be avoided if Debian downloaded from GitHub's distributions of the source code.

All of this would be avoided if Debian downloaded from GitHub’s distributions of the source code, albeit unsigned.

In that case they would have just put it in the repo, and I’m not convinced anyone would have caught it. They may have obfuscated it slightly more.

It’s totally reasonable to trust a tarball signed by the maintainer, but there probably needs to be more scrutiny when a package changes hands like this one did.